Description of the vulnerability

The LSA Type 1 Update (LSU, Link-State Update) message is used to update the routing database. However, the RFC does not request to check the "Link State ID" and "Advertising Router" fields of LSU messages. Several implementations (Cisco, Juniper, etc.) therefore do not perform this check.

An attacker can thus spoof a LSU message if he knows:
- the IP address of the target router
- LSA DB sequence numbers
- the router ID of the OSPF Designated Router

Description of the vulnerability

The ntpd daemon of NTP.org manages the local time by receiving information from several time servers with upper stratum.

However, if an attacker acts as a Man-in-the-Middle, and sends invalid information to NTP.org, the daemon restarts. Then, during the restart, the attacker can continue to spoof upper time servers, to change the time. If ntpd is started without the "-g" option, the time change is limited to 900 seconds.

Description of the vulnerability

The VIGILANCE-VUL-15485 (POODLE) vulnerability originates from an incorrect management of SSLv3 padding.

The F5 BIG-IP product can be configured to "terminate" SSL/TLS sessions. However, even when TLS is used, this BIG-IP feature uses the SSLv3 function to manage the padding. TLS sessions are thus also vulnerable to POODLE.

The same vulnerability also impacts Check Point, Cisco, IBM and Fortinet products.

Description of the vulnerability

Several vulnerabilities were announced in bash.

An attacker can force a read at an invalid address in redir_stack, in order to trigger a denial of service. [severity:1/4; CVE-2014-7186]

An attacker can generate a buffer overflow of one byte in word_lineno, in order to trigger a denial of service, and possibly to execute code. [severity:1/4; CVE-2014-7187]Full Vigil@nce bulletin... (Free trial)

Our database contains other pages. You can request a free trial to read them.